Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0575: A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and

0
High
VulnerabilityCVE-1999-0575cve-1999-0575
Published: Wed Jan 01 1997 (01/01/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_nt

Description

A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking.

AI-Powered Analysis

AILast updated: 07/01/2025, 12:40:26 UTC

Technical Analysis

CVE-1999-0575 is a vulnerability affecting Windows NT systems where the user audit policy fails to log both successful and failed security-related events. Specifically, events such as Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, System Restart and Shutdown, and Process Tracking are not recorded in the audit logs. This lack of logging undermines the ability to monitor and detect unauthorized or malicious activities on the system. Since audit logs are a critical component for security monitoring, incident response, and forensic investigations, their absence creates a blind spot that attackers can exploit to operate undetected. The vulnerability has a CVSS score of 7.5 (high severity), with a vector indicating network attack vector (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and impacts on confidentiality, integrity, and availability (C:P/I:P/A:P). Although this vulnerability dates back to 1997 and affects legacy Windows NT systems, it remains relevant in environments where such systems are still in use. No patches are available, and no known exploits in the wild have been reported, but the inherent risk remains significant due to the critical nature of audit logging in security posture.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial if legacy Windows NT systems are still operational within their IT infrastructure. The inability to log critical security events severely hampers the detection of unauthorized access, insider threats, and malicious activities. This can lead to prolonged undetected breaches, data exfiltration, and potential disruption of business operations. Confidentiality is at risk because unauthorized access attempts are not logged; integrity is compromised as unauthorized changes to user rights or security policies may go unnoticed; availability can be affected if system restarts or shutdowns are not tracked, potentially masking denial-of-service or sabotage attempts. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, government) may face regulatory and legal consequences due to insufficient audit trails. Additionally, the lack of logging complicates incident response and forensic investigations, delaying remediation efforts and increasing recovery costs.

Mitigation Recommendations

Given that no patches are available for this vulnerability, European organizations should prioritize the following mitigation strategies: 1) Phase out and replace legacy Windows NT systems with supported and updated operating systems that provide robust and configurable audit logging capabilities. 2) Implement compensating controls such as network-level monitoring and intrusion detection systems (IDS) to detect anomalous activities that audit logs would normally reveal. 3) Enforce strict access controls and user privilege management to minimize the risk of unauthorized changes and access. 4) Regularly review and harden security policies to reduce the attack surface on legacy systems. 5) Employ centralized logging and Security Information and Event Management (SIEM) solutions to correlate events from multiple sources, compensating for gaps in local audit logs. 6) Conduct regular security assessments and penetration tests focused on legacy systems to identify and remediate other potential weaknesses. 7) Educate IT staff about the risks of operating unsupported systems and the importance of monitoring alternative indicators of compromise.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de608

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 12:40:26 PM

Last updated: 2/7/2026, 4:16:04 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats